IoT security: ongoing challenges and research opportunities ZK Zhang, MCY Cho, CW Wang, CW Hsu, CK Chen, S Shieh 2014 IEEE 7th international conference on service-oriented computing and …, 2014 | 971 | 2014 |
Password authentication schemes with smart cards WH Yang, SP Shieh Computers & Security 18 (8), 727-733, 1999 | 451 | 1999 |
Taxonomy of security attacks in sensor networks and countermeasures T Roosta, S Shieh, S Sastry The first IEEE international conference on system integration and …, 2006 | 165 | 2006 |
Imaged document text retrieval without OCR CL Tan, W Huang, Z Yu, Y Xu IEEE Transactions on Pattern Analysis and Machine Intelligence 24 (6), 838-844, 2002 | 151* | 2002 |
Emerging security threats and countermeasures in IoT ZK Zhang, MCY Cho, S Shieh Proceedings of the 10th ACM symposium on information, computer and …, 2015 | 132 | 2015 |
An efficient broadcast authentication scheme in wireless sensor networks SM Chang, S Shieh, WW Lin, CM Hsieh Proceedings of the 2006 ACM symposium on information, computer and …, 2006 | 110 | 2006 |
On a pattern-oriented model for intrusion detection SP Shieh, VD Gligor IEEE transactions on knowledge and data engineering 9 (4), 661-667, 1997 | 110 | 1997 |
Secure encrypted-data aggregation for wireless sensor networks SI Huang, S Shieh, JD Tygar Wireless Networks 16 (4), 915-927, 2010 | 99 | 2010 |
Web application security: Threats, countermeasures, and pitfalls HC Huang, ZK Zhang, HW Cheng, SW Shieh Computer 50 (6), 81-85, 2017 | 94 | 2017 |
Keystroke statistical learning model for web authentication CH Jiang, S Shieh, JC Liu Proceedings of the 2nd ACM symposium on Information, computer and …, 2007 | 79 | 2007 |
Efficient key distribution schemes for secure media delivery in pay-TV systems YL Huang, S Shieh, FS Ho, JC Wang IEEE Transactions on Multimedia 6 (5), 760-769, 2004 | 73 | 2004 |
A pattern-oriented intrusion-detection model and its applications SW Shieh Proceedings. 1991 IEEE Computer Society Symposium on Research in Security …, 1991 | 69 | 1991 |
Defending against spoofed DDoS attacks with path fingerprint FY Lee, S Shieh Computers & Security 24 (7), 571-586, 2005 | 68 | 2005 |
Digital multisignature schemes for authenticating delegates in mobile code systems SP Shieh, CT Lin, WB Yang, HM Sun IEEE Transactions on Vehicular Technology 49 (4), 1464-1473, 2000 | 67 | 2000 |
Case instance generation and refinement for case-based criminal summary judgments in Chinese. CL Liu, CT Chang, JH Ho Journal of Information Science and Engineering 20 (4), 783-800, 2004 | 66 | 2004 |
S-AKA: A provable and secure authentication key agreement protocol for UMTS networks YL Huang, CY Shen, SW Shieh IEEE transactions on vehicular technology 60 (9), 4509-4519, 2011 | 59 | 2011 |
Construction of dynamic threshold schemes HM Sun, SP Shieh Electronics Letters 30 (24), 2023-2025, 1994 | 58 | 1994 |
Penetration testing in the iot age CK Chen, ZK Zhang, SH Lee, S Shieh computer 51 (4), 82-85, 2018 | 53 | 2018 |
Secret sharing in graph-based prohibited structures HM Sun, SP Shieh Proceedings of INFOCOM'97 2, 718-724, 1997 | 51 | 1997 |
An authentication protocol without trusted third party SP Shieh, WH Yang, HM Sun IEEE Communications Letters 1 (3), 87-89, 1997 | 48 | 1997 |